Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 18

Safety

SAFETY ISSUES Issues


with ICT
INCLUDING DIGITAL Internet

SAFETY RULES Safety


SAFETY ISSUE

 Any event, report data or


information, which could
cause a re-evaluation of the
safety product and service.

 An act, change, event, circumstance or


occurrence that endangers, or would
reasonably be expected to endanger,
persons, property or the integrity or normal
operations.
INTRODUCTION

The internet is a fantastic place for children to


learn, create and have fun, but they may
occasionally have to deal with a variety of
sometimes challenging issues.

These might include cyber bullying, the pressure


to take part in sexting, encouragement to self-
harm, viewing pornography, along with various
others. But there are positive things you can do to
equip yourself and your child, support them in
resolving any issue they may face.
EXPLORE

 
What are the importance of digital safety
rules?
By practicing Online Safety, we can prevent and mitigate the risks
that are inherently involved with using digital technologies,
platforms and services. Once the risks are managed, the internet can
be enjoyed free from harm and to enormous benefit.

Why is online safety security ethics and etiquette


is important?
Following good online practices helps to ensure that we can get the
most out of our online experience. Being mindful and respectful
of others, their views, opinions – even if they don't agree with
them – and their property are all part of practicing good online
etiquette.
EXAMPLES OF SAFETY ISSUES:
 
CYBERBULLYING

Cyber bullying or cyber harassment is a form of bullying or


harassment using electronic means. Cyber bullying and cyber
harassment are also known as online bullying. It has become
increasingly common, especially among teenagers, as the digital
sphere has expanded and technology has advanced.
CYBER PREDATORS
Cyber predators are people who use the internet to exploit
usually younger people for sexual and other purposes. Many
cyber predators pretend to be someone else, or lie about details
about themselves to gain trust of their victims. It has been
estimated that one in five children have been sexually solicited
online.
POSTING PRIVATE INFORMATION
Why you should keep your personal information private
securing your personal information can help you:

1. Prevent identity theft


2. Protect your financial information
3. Avoid being robbed.
4. Protect your employability.
5. Maintain your business’s reputation.
6. Protect your freedom of though
7. Gain admission to the school of your choice
8. Keep your insurance
9. Defend yourself in legal proceedings
10.Protect yourself from threats that don’t exist yet.
PHISHING
Phishing is a cyber attack that uses disguised email as a
weapon. The goal is to trick the email recipient into believing
that the message is something they want or need — a request
from their bank, for instance, or a note from someone in their
company — and to click a link or download an attachment.
FALLING FOR SCAMS

September is Disaster Preparedness Month. During situations


like a natural disaster or health emergency, scammers work
fast to come up with new ways to con you out of money or to
gain access to sensitive personal or financial information
ACCIDENTALLY DOWNLOADING MALWARE
Malware — short for malicious software — refers to
programs specifically engineered to compromise computers
or other devices. Malware can present itself in many forms
such as viruses, Trojan horses, worms, adware, ransom ware
and spyware
POSSIBLE SIGNS OF MALWARE INFECTION
The presence of malware sometimes is obvious, even though
you might not know how it got on your device. A lot of people
have no idea that malware has been installed until their
computers or devices start acting abnormally. Symptoms of
malware may appear obvious or discrete. Knowing how to
detect these dangerous intrusions can help you determine how
to fix the issue.
 
DIGITAL SAFETY; SECURITY AND HOW TO STAY PROTECTED
ONLINE

1. Use a (reliable) antivirus software

Threats can be found at every corner of the internet. Worms,


Trojans, ransom ware and other malicious and potentially
unwanted programs are some of the most common that can be
blocked with an effective antivirus software package.

2. Take further safety precautions via third-party software

Antivirus packages do a great job at protecting users whilst


browsing the internet, but they do not provide full protection
from cyber threats. Browsing safely is becoming more and more
difficult as the threats become more sophisticated.
3. Back up your work (multiple times if possible)

Possibly the easiest precaution we could take to ensure that our


valuable files are not lost in the event of a security breach or
software/hardware failure. In the event of a serious incident, if
backups of files are made, the organization, department or
system can be restored to its original state before the breach.

4. Do not duplicate passwords across accounts

We are all sometimes guilty of this. As previously mentioned,


we rely on more and more third-party cloud-based services for
our daily tasks which require us to log in with a username and
password. Often, the username doesn’t change from our email
address, and often – where we will put our accounts at risk –
our passwords also do not change per account or service.
5. Do not share personal data unless you have to

Social media platforms, as well as other websites and services,


require your data to complete a transaction, use a platform or
access materials. In the digital age, data has sometimes become
the currency (instead of real currency) meaning that it is
impossible not to have to share personal data such as names,
addresses, telephone numbers etc. But you do not always have to
share specific data.
EXAMPLE OF DIGITAL SAFETY RULES:

Never leave your device unattended

One minute it’s there and the next minute it’s gone.
Smartphones, laptops and tablets have a decent resale value.
Besides, now cybercriminals make more money by stealing the
data that’s stored in these devices than from reselling them.
Information like passwords, addresses, birthdates of family
members, and Social Security numbers fetch a pretty price in
the underground economy.

Click with caution

Whether subtle or bold, phishing is dangerous. One careless


click is all it takes for malicious software to get into devices
and wreak havoc. Talk to your kids about not automatically
clicking on links in emails.
Never ever share your password

You may think that everyone knows the importance of keeping


passwords a secret — but maybe your children don’t. After all, 76%
of people share passwords.1 It takes just one moment of poor
decision making and you risk exposing everything stored in your
device.
Be wary of using social media

Many social networks require users to be at least 13 years of age,


but some allow children to sign up with their parent’s
permission. If your children have accounts, check their privacy
settings. The default settings may expose more information than
you’d like.
Be a good online citizen
Remember, the Internet is forever. So anything said online stays
online. Nothing really gets deleted, not even on Snap chat.
Unfortunately, since the Internet is the new playground, bullying
can plague children offline and on. Teach your children to
practice good online etiquette and to never say mean things.
THANK YOU!!
PREPARED BY: MARY ANN CARURUAN

You might also like